Scan to download
BTC $70,740.69 -2.62%
ETH $2,076.78 -2.43%
BNB $645.12 -1.41%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $457.98 -0.19%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%
BTC $70,740.69 -2.62%
ETH $2,076.78 -2.43%
BNB $645.12 -1.41%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $457.98 -0.19%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%

browser

ClickFix attack escalates, hackers impersonate VCs and hijack browser extensions to steal crypto assets

The cybersecurity agency Moonlock Lab reports that crypto hackers have recently upgraded their "ClickFix" attack method, beginning to impersonate venture capital firms to contact target users through social platforms and lure them into executing malicious code to steal crypto assets.Attackers disguise themselves as fake venture capital firms such as SolidBit, MegaBit, and Lumax Capital, sending collaboration invitations via LinkedIn and guiding victims to fake Zoom or Google Meet meeting links. The pages embed a fake Cloudflare "I am not a robot" verification button, which, when clicked, copies malicious commands to the clipboard and tricks users into pasting and executing them in the terminal, thus completing the attack. Researchers point out that this method circumvents traditional security mechanisms by "making victims execute commands themselves."Meanwhile, hackers are also hijacking browser extensions to carry out attacks. John Tuckner, founder of cybersecurity company Annex Security, revealed that the Chrome extension QuickLens, after changing ownership on February 1, released a new version containing malicious scripts two weeks later, triggering ClickFix attacks and stealing user data. The extension had about 7,000 users and has since been removed from the store. Reports indicate that the hijacked extension scans crypto wallet data and mnemonic phrases, and scrapes Gmail content, YouTube channel data, and web login or payment information.

BitsLab acquires the Japanese security browser plugin KEKKAI Plugin and officially launches BitsLab Safe

ChainCatcher news, the Web3 security organization BitsLab announced that it has completed the acquisition of the security browser plugin KEKKAI Plugin from the Japanese Web3 infrastructure company KEKKAI Labs, and has officially renamed it to BitsLab Safe.KEKKAI Labs is a Japanese tech team focused on Web3 security and infrastructure development, with its core product KEKKAI Plugin having a solid user base and high usage rate in the Asian market.BitsLab stated that this acquisition aims to expand its security capabilities from B-end services to C-end security. BitsLab will retain the original features of KEKKAI Plugin while introducing its own AI-driven security analysis and threat detection technology to expand and upgrade the product's functionality intelligently.It is reported that the renamed BitsLab Safe is a free browser security plugin aimed at ordinary users. Its core features include: automatically simulating the transaction process before executing transactions in the wallet, displaying results in advance, issuing warnings when dangerous contracts or malicious actions are detected, and providing phishing website protection and alerts. BitsLab plans to make this product an important part of its AI security ecosystem.Previously, BitsLab's main business focused on B-end services such as security audits, penetration testing, and vulnerability mining, having provided solutions for over 400 projects covering mainstream ecosystems like Sui, Aptos, TON, and Solana. This acquisition marks a strategic upgrade for BitsLab, aiming to build a complete security protection system "from underlying infrastructure to end users."
app_icon
ChainCatcher Building the Web3 world with innovations.